Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 3min
Lena, What Do You Think About Cloud Attacks?
02:36 • 5min
What's the P of Persistence in the Cloud?
07:44 • 2min
Is There a Way to Track a Token Using a CI Key?
10:11 • 5min
The Golden Samal Attack and Pass Through Authentication Abuse
14:59 • 5min
How to Be Nice to Your Incident Handler?
20:01 • 2min
How Do You Mitigate This Business Disruption?
22:18 • 4min
How Do You Prevent Burnout in IR?
26:30 • 3min
Cloud Attacks Training - What's Next?
29:27 • 5min
Application Security Weekly - The Latest News
34:24 • 2min
Make Money Off of Security Features Like SSO.tax
36:15 • 2min
Is SSO.tax a Security Tax?
38:05 • 2min
Web Three - Is the Wallet the Cookie of the Future?
39:41 • 2min
Is There a Critical Vulnerability in the Cryptocurrency Market?
41:35 • 5min
Adobe Trust Center
46:49 • 1min
Is Adobe's SOC 2 Bridge Letters Transparent?
48:15 • 5min
OOSP Top 10 for Kubernetes
53:17 • 3min
Kubernetes - What's the Top 10 List?
56:11 • 2min
OASP Kubernetes, AI and Security Privacy Guide
57:55 • 5min
Fuff or Fuff U F Is a Web Fuzzer for HTTP Clients
01:02:38 • 2min
Bug Bounties Are a Great Way to Learn and Experiment
01:04:37 • 5min
Application Security Weekly - Thank You Akira
01:09:38 • 2min